Appendix A. Securing the Server

  • Make sure the user running the server only has access to the data directories and has as little other privileges as possible. Also, disable its shell access as instructed in the installation section.
  • Install a firewall (ufw works pretty well) and restrict access to non-necessary ports.
  • Disable SSH user/password authentication and favor key-based authentication.